-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Package: quagga
Version: 0.99.22.4-1+wheezy3+deb7u1
CVE ID : CVE-2016-1245
Debian Bug : 841162
It was discovered that there was stack overrun in IPv6 RA receive code in
quagga, a BGP/OSPF/RIP routing daemon.
The buffer s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: libxrender
Version: 1:0.9.7-1+deb7u3
CVE ID : CVE-2016-7949 CVE-2016-7950
Debian Bug : 840443
Tobias Stoeckmann from the OpenBSD project has discovered a number of
issues in the way various X client libraries ha
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Package: tor
Version: 0.2.4.27-2
It has been discovered that Tor treats the contents of some buffer
chunks as if they were a NUL-terminated string. This issue could
enable a remote attacker to crash a Tor client, hidden service, rel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: libgd2
Version: 2.0.36~rc1~dfsg-6.1+deb7u6
CVE ID : CVE-2016-6911 CVE-2016-8670
CVE-2016-6911
invalid read in gdImageCreateFromTiffPtr()
(most of the code is not present in the Wheezy version)
CVE-2016-86
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: guile-2.0
Version: 2.0.5+1-3+deb7u1
CVE ID : CVE-2016-8605 CVE-2016-8606
Debian Bug : 840555 840556
Several vulnerabilities were discovered in GNU Guile, an
implementation of the Scheme programming language. The